Sungard AS Blog | //CYBER SECURITY

    What Are Phishing Attacks and How Do You Spot Them?

    By Sungard AS The threat of a cyber-attack is growing and with high profile hacking scandals filling the headlines, it seems like 2017 is the year businesses are...

    IoT Poses Growing Cyber Security Risks

    By Sungard AS There is seemingly nothing that can't be connected to the internet – from parking meters to washing machines and even cattle. But the corollary is that...

    Cyber Security: It's Everyone’s Problem

    By Sungard AS Cyber security is an increasingly major issue and it is likely that businesses are more than aware of the risks and threats that face their company from...

    10 Cyber Security Tips for Any Growing Business

    By Sungard AS The internet has brought huge advantages to small- and medium-sized businesses. But it also brings the risk of cyber attacks, attempts to steal...

    Educating Employees on Cyber Security

    By Sungard AS Many cyber security threats, such as advanced malware, can only be countered with sophisticated technology. But on a day-to-day basis, employees are...

    Cyber Security Predictions for 2017

    By Sungard AS Cyber security never stands still. As businesses wake up to the need to prioritize information security, cyber criminals are becoming increasingly...

    Shedding tears over WannaCry

    By Sungard AS Organizations worldwide were hit by the WannaCry cyberattack, which crippled over 200,000 computers in more than 150 countries worldwide. Repercussions...

    Leave Your Laptop In Your Car And 9 Other Bad Cyber Security Habits

    By Sungard AS In a perfect world, employees would have excellent cybersecurity habits and never put the company's network or data at risk. This isn't a perfect world,...

    The #1 Cyber Security Threat To Information Systems Today

    By Sungard AS Vulnerable web applications are among the greatest cyber security threats to information systems today. Cyber security is a top concern in the IT...

    What Is Identity Management?

    By Sungard AS Identity management (sometimes known as identity and access management) helps corporations manage and control user access to different systems on a...

    Four Things Every Business Continuity Expert Needs to Know About Cyber Security

    By Sungard AS Halloween is here – time for kids to go trick-or-treating, for teens to visit haunted houses, and for Americans to spend nearly $7 billion on costumes,...
    x

    SUBSCRIBE TO OUR BLOG

    Advice, stories, and expertise about work life today.

    x

    THANK YOU!

    We know your inbox is protected space, so we promise to send only the good stuff, twice a month.